Can the Election Be Hacked?
by Jesse Roberts on August 27, 2020 at 2:15 PM
The presidential election is less than three months away and questions revolving around the overall security of the electoral process should be on everyone’s mind. Let us discuss some areas that may be susceptible to hacking. I will be assigning a threat level based on my own professi …
Contact Tracing – Personal Information Privacy Concerns
by Jesse Roberts on May 18, 2020 at 2:00 PM
COVID-19 has turned the world upside down. Everyone is feeling the effects of the global pandemic. Governments are still in react mode on how to best deal with a virus that for the short term does not seem to be going away. Without a vaccine in place, the world will need to rely on co …
Microsoft Teams – The New Phishing Platform for Hackers?
by Jesse Roberts on March 13, 2020 at 1:00 PM
Many organizations are moving to cloud services for email, voice, and collaboration software. One of the major services being offered is Microsoft Teams. Teams is powerful collaboration software that allows users to share files, screen share, instant message, schedule meetings and voi …
Incident Response for Real
by Jesse Roberts on December 4, 2019 at 3:04 PM
Organizations are finally beginning to implement some type of incident response plans. Most of these plans revolve around NIST 800-61 Computer Security Incident Handling Guide. This guide is an amazing framework to help your organization get something in place, however, just referenci …
Macs Can Get Viruses?
by Jesse Roberts on August 21, 2019 at 2:15 PM
Through my work at Compass IT Compliance I was recently contacted to deal with an issue regarding a Mac computer acting suspiciously. What does suspicious mean? In the case of this particular Mac, whenever a user tried to open the Safari web browser they were getting directed to the h …